Features
Safe Harbor for Service Providers under the Anticybersquatting Act
GoDaddy.com has been the prevailing defendant in two major lawsuits under the Anticybersquatting Consumer Protection Act (ACPA). In both cases, plaintiffs sought to hold a defendant liable for contributory or secondary infringement rather than "direct" cybersquatting under the ACPA. The principal reason for plaintiffs' lack of success lies in a fundamental misunderstanding of the ACPA.
Columns & Departments
Bit Parts
New York Federal Court Dismisses Copyright Plaintiff's Suit Against Former Lawyers<br>Nicollette Sheridan's Retaliation Claim in L.A. Superior Court Needn't First Be Filed with California Labor Commissioner
Features
Damages In Design Patent Infringement Cases
The successful plaintiff in a design patent infringement case is entitled to recover the greater of the defendant's profits or its own damages, regardless of how the jury desires to apportion the award. Thus, in <i>Nordock, Inc. v. Systems Inc.,</i> the Federal Circuit ordered a new damages trial on the grounds that the amount of defendant's profits assessed by the jury was not supported by the evidence or in accordance with the law.
Features
Designs on Cheerleader Uniforms Can Be Copyrighted
When is a graphic design a "work of authorship" that, when incorporated into the design of a useful article, is "identified separately from, and ' capable of existing independently of, the utilitarian aspects of the article"? In deciding that the designs on cheerleader uniforms were more like copyrightable fabric designs than unprotectable garment designs, the Sixth Circuit undertook a lengthy analysis of "separability.
Features
Contracting with Minors
One of the fundamental principles of U.S. contract law is that a party must have the capacity to enter into a contract in order to be bound. Minors, as a general rule, lack this capacity. As a result, any contract made with a minor might not be enforceable. Yet in certain circumstances, contracts with minors are commonplace. The following identifies some risks, some mitigating solutions and the limitations of those solutions when contracting with a minor.
Features
Protecting Your Company's Data from Security Breaches
This article explores some steps counsel can take to protect their organizations from a data breach, and how counsel can proactively help to mitigate any adverse impact in the unfortunate event a data breach occurs.
Features
The Art of Cyberwarfare
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.
Features
Data Sharing In the Cloud
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
Columns & Departments
Court Watch
Franchisees and Dealers Should Plead Causation In Actions Against the Government <br>Michigan Court Transfers Case Brought By 41 Franchisees to Franchisor's Home State
Features
Managing Security Risks During Labor Disputes
Every company with union workers faces the risk of a labor dispute. Identifying any business risks and then managing them is a priority for executive decision-makers who must ensure that the company delivers its promises to stockholders, customers and employees. The process is well defined in business terms:
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted WorkCopyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Sender Beware: Jurisdictional Risks of Pre-Litigation CommunicationsThe Federal Circuit recently clarified — and lowered — the threshold to exercise specific personal jurisdiction over an out of state declaratory judgment defendant.Read More ›
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Supreme Court Rules Rejection of Trademark License Does Not Rescind Rights of LicenseeMission Product Holdings, Inc. v. Tempnology, LLC The question is whether a debtor's rejection of its agreement granting a license "terminates rights of the licensee that would survive the licensor's breach under applicable nonbankruptcy law."Read More ›